Journal
IEEE TRANSACTIONS ON SERVICES COMPUTING
Volume 15, Issue 1, Pages 567-587Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TSC.2019.2937764
Keywords
Cloud computing; security; privacy; cryptography
Funding
- National Key R&D Program of China [2017YFB0802000]
- National Natural Science Foundation of China [61972159, 61572198, 61872152, 61972095, U1736112]
- Fundamental Research Funds for the Central Universities
- Guangdong Natural Science Funds for Distinguished Young Scholar [2014A030306021]
- Guangdong Program for Special Support of Top-notch Young Professionals [2015TQ01X796]
- Pearl RiverNova Programof Guangzhou [201610010037]
- Cloud Technology Endowed Professorship
- 13th Five-Year Plan of National Cryptography Development Fund for Cryptographic Theory of China [MMJJ20170204]
- Sichuan Science and Technology Project [2018KZ007]
Ask authors/readers for more resources
This paper provides a critique of cryptographic schemes designed for securing sensitive data in the cloud computing environment, as well as outlining research opportunities in the use of cryptographic techniques in cloud computing.
While cloud computing is relatively mature and its potential benefits well understood by individual, industry and government consumers, a number of security and privacy concerns remain. Unsurprisingly, designing cryptographic solutions to ensure the security of cloud services and the privacy of data outsourced to the cloud remains an ongoing research area. This paper provides a critique of the wide range of cryptographic schemes designed for securing sensitive data in the cloud computing environment, as well as outlining the research opportunities in the use of cryptographic techniques in cloud computing.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available